Hamburger X.

What is Monero? An In-Depth Guide

what is monero

Monero Classified Image

What is Monero?

Originally launched in April 2014 as BitMonero, Monero (symbol XMR), means money in Esperanto. Monero, a fork of Bytecoin, is a secure, private and untraceable currency, built on the Cryptonote protocol and Ring Signatures. New coins are issued through a Proof of Work mechanism called CryptoNight which incentivizes miners to secure the network and validate transactions.

The public and hidden Monero ledger allows anyone to send and receive transactions privately. This means no outside observer would know the sender, amount or destination. 

Monero and it’s community are committed to 3 key values: (1) Security, (2) Privacy and (3) Decentralization

The Monero website elaborates further:


Users must be able to trust Monero with their transactions, without risk of error or attack.


Monero takes privacy seriously. Monero needs to be able to protect users in a court of law and, in extreme cases, from the death penalty.


Monero is committed to providing the maximum amount of decentralization.

Monero is based on an application level cryptographic protocol focused on privacy called Ring Signatures.

Ring Signatures were originally proposed at a 2001 Cryptography conference in Queensland, Australia called Asiacrypt, an international gathering for cryptography research. The authors of Ring Signatures included Ron Rivest, Adi Shamir, and Yael Tauman. Ring Signatures is the core mechanism behind how Monero transactions are structured after being broadcasted from the wallet.

The core use case behind Monero is how transactions are not linkable or traceable because of stealth addresses. This protects sender and receivers while also allowing selective observation of transactions through a public/private view key construct in addition to normal private/public keys (more on this later).

Monero has a variable block limit which allows flexibility in data management (block sizes) and scalability. This is needed in great part due to Monero’s architecture which requires much more cryptography and data around transactions.

Ultimately, Monero uses ring signatures, ring confidential transactions (RCT) and stealth addresses to obfuscate transactions at the protocol level to protect both senders and receivers from eavesdropping while still allowing transactions to be validated by a third party if desired.

Technical Details

Launched: April 14, 2014

Total coin supply: Initially 18.4 million coins (After this, there will be a permanently fixed production of 0.3 XMR per minute to balance out lost coins per year)

Algorithm: Proof of Work (PoW) using CryptoNight

Block reward: Smoothly varying

Block time: 120 seconds

Difficulty: Retargets at every block

“Tainted” Bitcoins Threaten Fungibility of Cryptocurrencies

Fungibility allows the same type of a good or asset to be interchanged with another. This implies equal value between the goods and assets. For example, you could trade 1 silver eagle coin for another 1 silver eagle coin (indicating the same value between the two coins).

But, what if you couldn’t trade your silver coin for another because maybe that silver coin was used in illegal activity?

This is the exact conundrum that Bitcoin faces due to its complete transparency architecture. If some agency decided a certain Bitcoin transaction was used for illegal purposes it would threaten the ability for that Bitcoin to be acceptable as a fungible currency.

This is a mission-critical construct to something being considered “money” and is disconcerting to see Bitcoin underfire. Luckily, Monero aims to fix this problem through baked in and coded privacy.

Dilbert with Dogbert comic strip about fungibility

Dogbert knows what’s up. | Dilbert © 2006 Scott Adams

Monero vs Bitcoin: Issues To Be Solved

One of Bitcoin’s big downfalls is the lack of flexibility for the implementation of new features, which require almost complete network updating. (As we are seeing with the blocksize debate)

This includes hard-coded constraints and natural elements of the design (such as block frequency, maximum amount of money supply, and # of confirmations required).

The traceability of both transaction amounts, as well as the sender/receiver, is publicly viewable automatically with Bitcoin unless specific steps are taken by the user.

The proof of work algorithm (PoW) has also violated the original Satoshi vision of “one-CPU-one-vote” with the advent of GPU and Application Specific Integrated Circuit (ASIC) hardware. This allows those miners to gain majority control (51%+) over the network and govern changes. (Like a fork, to keep the network going.)

Irregular emission refers to the construct where the Bitcoin rewards are halved every 4 years. The original intent was to create limited smooth emission with exponent decay. (More predictable not choppy pattern)

Instead, we have a piecewise linear emission (as pictured below) which creates the opportunity for a double spend attack. This is due to the network hash rate decrease at each halving. Note the “stairwell” like moves.

The Bytecoin Fork and details of its creation

Bytecoin is the first known implementation of the CryptoNote protocol with code produced entirely from scratch. But, why was Monero needed if there was already an implementation of this? Well, as always with Crypto, prepare for some drama.

As elaborated in this Monero subreddit from 3 years ago, there was not only a Bytecoin premine but also falsifying the blockchain to show a fair distribution. Then, there were 2 years of “crippled” code that could have been improved but was not. Ricardo Spagni aka “Fluffypony” said the Monero team fixed these problems in a few weeks.

Monero Team

Per the website, the core team includes:

In addition, there have been over 30 developers and 420 contributors over the life of the project.

Monero Technology: Ring Signatures, Ring Confidential Transactions (RingCT) and Stealth Addresses

The main tech behind Monero is a balance of allowing the user to control their keys and operate privately with proven security mechanisms while also allowing malleability and development in the network. (E.g. variable blocksize, integration of Kovri)

How a normal (not fully anonymous) transaction works

The default set-up for Bitcoin transactions is completely transparent and pseudonymous if steps are not taken to obscure one’s identity and transactions (e.g. a VPN and mixing services). This means your IP address can be connected to your device (i.e. personal identity) with enough resources dedicated to connecting the two.

Ring Signature Transactions include multiple signers, unknown to outside observers

Ring Signatures Provide Anonymity

Ring Signatures (shown above) are digital signatures where several signers sign a transaction. (Think: signing with a joint account but with no one knowing the true signer)

The sender generates a one-time spend key and the recipient is the only party that can detect and spend the money based on that key.

Key images, a cryptographic key, are derived from each output being spent and prevent double spending. This is because there’s one key image per output (expenditure) on the Blockchain.

A ring signature uses your account keys and selected public keys from the blockchain to form a “ring” of possible signers. The main security property of a ring signature is making it impossible to see which group members’ keys produced the signature.

No outside observer can match signers in the ring ensuring that transaction outputs are untraceable. In addition, fungibility is guaranteed as the network does not know amounts spent (despite being able to validate a real transaction took place).

Charlie Lee Tweet about Ring Confidential Transactions

Ring Confidential Transactions (RCT) hide the amount sent

The sender can reveal just enough information for the miners to confirm the transaction without disclosing publicly the total amount spent. (Known as a “commit”) This allows the transaction to be validated as authentic without losing privacy as a user.

The amount of each output is encrypted and included in the transaction. The amount encrypted by the sender uses a shared secret built into the transaction computed by combining the recipient’s private view key with the transaction public view key (which is built in the transaction)

Third parties will not be able to view the amount based on this construct of Ring Confidential Transactions (RCT)

RingCT outputs

RingCT outputs are now mandatory as of September 2017


Stealth addresses protect senders and receivers

Moneropedia sheds light on this construct which protects senders and recipients from outside observers:

Stealth addresses are an important part of Monero’s inherent privacy. They allow and require the sender to create random one-time addresses for every transaction on behalf of the recipient.

By using stealth addresses, only the sender and receiver can determine where a payment was sent.

When you create a Monero account you’ll have a private view key, a private spend key, and a Public Address. The spend key is used to send payments, the view key is used to display incoming transactions destined for your account, and the Public Address is for receiving payments. Both the spend key and view key are used to build your Monero address. You can have a “watch only” wallet that only uses the view key.

A stealth address ultimately prevents recipient’s funds being linked with their wallet. However, that address can be audited by a 3rd party to prove the transaction occurred. (By the sender sharing their public view key)

The recipient gets their funds through their wallets private view key which scans the blockchain. Once detected and retrieved by the wallet, a single-use private key is created (corresponding with senders public key). 

The recipient can now spend those funds using their private spend key. This occurs without the sender or recipient wallets, nor the amount transacted publicly linked. 

From BCHGraz - Meetup #9 - Monero by Justin Ehrenhofer

How Stealth Addresses protect Senders and Recievers | Source: Justin Ehrenhofer, Slideshare

How Monero transactions work

This process is very succinctly explained in this Monero Bitcointalk thread (numbers go with a picture below):

“Bob decides to spend an output, which was sent to the one-time public key. He needs Extra (1), TxOutNumber (2), and his Account private key (3) to recover his one-time private key (4)When sending a transaction to Carol, Bob generates its Extra value by random (5). He uses Extra (6), TxOutNumber (7) and Carol’s Account public key (8) to get her Output public key (9)

In the input, Bob hides the link to his output among the foreign keys (10). To prevent double-spending he also packs the Key image, derived from his One-time private key (11)Finally, Bob signs the transaction, using his One-time private key (12), all the public keys (13) and Key Image (14). He appends the resulting Ring Signature to the end of the transaction (15).”

Key differences from other mainstream privacy protocols

How does Monero compare with alternate privacy-focused solutions?

The main point of differentiation with Monero is the CryptoNote implementation, which has been around since 2001 and has received significant peer-review around its functionality. (Traceable Ring signatures for example)

Two other implementations of privacy technology from other Cryptocurrencies include:

ZeroCoin/ZeroCash – Using zero-knowledge proofs (ZKP) this protocol obscures the sender and the entire economy. Any exploits (such as creating false proofs/spending) wouldn’t be known until much later due to the anonymous nature of the network. One of the biggest risks is the lack of maturity and peer review behind the cryptography. Also, ZKP relied on the initial RSA private key generated to be destroyed by the creators. (As supposedly done in this computer burning ceremony)

Monero vs Zcash: ZCash transactions are based on a Zero-knowledge Security Layer (ZSK)

CoinJoin is a mixing protocol that combines transaction but does not mask users, senders or transactions at a protocol level. Originally developed by bitcoin developer Gregory Maxwell, Coin Join is used by Dash, who leverages the Masternode (MN) model where users must possess 1000 DASH to host a MN. Critics say this creates a single point of failure as the individual nodes who provide the mixing service are vulnerable to Sybil attacks.

Monero vs Dash: Dash uses CoinJoin which mixes up transactions but does not provide protocol level protection of the sender and receivers

Charlie Lee, the creator of Litecoin, was recently asked by Edward Snowden about Zcash vs Monero:

Charlie Lee Monero vs Zcash

Kovri (based on I2P) Protects Users at a Protocol Level

Kovri is a free, decentralized, anonymous network layer developed by Monero that’s based on I2P’s core specifications. I2P’s core architecture operates similarly to TOR (which uses onion) except with Kovri it uses garlic encryption and routing to create private, protected network access.

Kovri (with its garlic routing) takes things a step further than TOR by creating an anonymous, message-based “overlay network” of internet peers. This “overlay-network” helps users to hide their geographical location and internet IP address thus making internet traffic anonymous.

I2P Infographic of the privacy network

How Monero Split into 5 forks (Actually 6 now)

A recent discovery of secret ASIC manufacturing of Monero miners has prompted the coin to be broken into 6 different “coins”.

As a result of discovering Monero ASIC manufacturing and secret mining (without the community’s knowledge), Monero decided to fork from its original algorithm due to the threat of centralized mining. 

This prompted a bit of a “war against ASICs” by the community eager to preserve their core values of decentralization which is threatened by centralized mining players.

Covered more in-depth in this article, Monero has split into six different coins. These new coins include: Monero 0 (XMZ), Monero Original (XMO), Monero Classic (XMC), Monero-Classic (yep, with a dash now), MoneroC (CXMR) and just announced recently MoneroV (XMV). The original Monero (XMR) still remains as well.

Critiques, Weaknesses, and Concerns

Although it appears Monero has many accolades, what are some of its weaknesses? As discussed in this subreddit there are a few:

  • Privacy – There’s been the ability to track the IP address of the node that originated a transaction. This logging of IP addresses could cause de-anonymization of users.
  • Mining Centralization – The majority of Monero mining is by 4 pools who each have no more than 20%. In addition, the advent of ASIC Monero mining further threatens the original ethos of “one-CPU-one-vote”, especially as things scale. (It was recently discovered that ASICs were being manufactured which has prompted a bit of a Crypto Miner algorithm battle to preserve decentralization)
  • Darkweb PR – Although this is not a direct cause of the Monero team, it is worth noting as the branding and public perception is always something to keep in mind and could slow adoption as people fear its use for illicit purposes.
  • Transaction size – Monero transactions are much larger than Bitcoin’s which requires more data and causes a larger blockchain which is continuously growing daily.
  • Development Difficulty – The ability to incorporate with multi-coin wallets and other integrations that would make use more widespread have been slow. 
  • Limited Merchant Tools – The tools for merchants to integrate payments is difficult and hard to integrate at this time. However, there are more and more third-party services popping up to help remedy this.

Accomplishments to date

  • Monero Transactions reduced by 97% – A recent hard fork upgrade implemented “bulletproofs”, a cryptographic scheme that reduces the size and cost of transactions. As a result, Monero’s transaction fees shrank by 97 percent, dropping from $.60 cents to just $.02 cents.
  • Kovri fork, creating more secure transactions with an I2P layer in C++ – This version rebuilt from scratch leverages, I2P, known as the Invisible Internet Project is a TOR alternative which would add a secure layer for all transactions pushed to the network. This was after user anonimal pleaded with the Monero community who agreed to fund full-time development to make it a reality. (Gotta love crowdfunding)
  • Monero Hardware wallet released – This project was organized and created as a funding mechanism in the Monero community called Forum Funding System (FFS) spearheaded by Michael Schloh von Bennewitz 15+ software and maker veteran as well as anonimal, Lead developer of Kovri. This is in addition to Ledger and Trezor integration in the works.
  • Ledger support live for developers – Although not completely rolled out for users, people with developer kits can leverage this functionality. We appear to be on the homestretch for this being available for Ledger users.
  • You can Pay on Overstock with Monero – Thanks to Shapeshift and their API, Overstock now accepts Monero as well as several other altcoins. This shows further credibility to have the more mainstream adoption.

How To Mine Monero

Although originally challenged by pool centralization, the recent fork away from ASIC miners caused the Monero (XMR) original pools hashrate to drop by more than 50%. This was prompted by the threat of secret ASIC mining that was significantly more efficient than GPUs.  As a result, Monero still remains as a GPU mineable coin on What To Mine. A list of mining pools can be found here.

How to Store Monero

There are a variety of desktop wallets for Monero including Linux, Mac and Windows.

On the hardcore developer side, there are Arm (v7 & 8) OS for chipsets used in Mobile devices and well as a source Blockchain which allows users to procure a blockchain bootstrap from a raw file

Mobile and light wallets include Cake Wallet, Monerujo, and My Monero

Hardware has had some action with support for the Ledger Nano S live now with the dev kit and will be rolled out to other Ledger users soon. Monero also has an internally-built wallet plan that was funded by the community and is currently in development.

Monero Cat

Monero is indeed (and has been) happening.


Monero, fork of Bytecoin, is a secure, private and untraceable currency. It is built on the Cryptonote protocol uses Ring Signatures, Ring Confidential Transaction and Stealth Addresses to protect user’s privacy.

The Monero community is driven by 3 key values: (1) Security, (2) Privacy and (3) Decentralization

The core use case behind Monero remains, namely how transactions are not linkable or traceable nor are the sender or receivers revealed. It also has selective transparency which allows users to make certain transactions visible if desired. (E.g. an auditor or another party to prove the transaction) Ironically, this feature is attractive to many commercial interests that seek to protect critical business data and trade secrets.

On the scalability side, a block limit exists to facilitate more flexible data management (block sizes) and growth solutions. This was by design to allow flexibiliy in the growth of Monero’s architecture (which requires more cryptography and data around transactions) than most Blockchains.

Although Monero has been a very steady and innovative player, this growth has not come without great struggles.  The recent discovery of secret ASIC manufacturing of Monero miners has prompted the coin to be broken into 6 different “coins”.

This has not only divided the communities but raised concerns of not only network security but also what true “decentralization” means.

Despite these looming threats, the dedication of the team to building a robust and secure project continues. With privacy protocols like Kovri and hardware wallets like the Ledger Nano on the horizon of being integrated, this bodes well for the project as development milestones continue to be reached. 

Keep this secure, privacy coin on your radar. The team and community are leaders in the industry and will be one to watch indefinitely.


Newsletter (Sidebar)

  • This field is for validation purposes and should be left unchanged.


types of stablecoins

Understanding the Three Types of Stablecoins

Learn about the three different types of stablecoins: centralized IOU stablecoins, crypto-collateralized stablecoins, and non-collateralized stablecoins.

Read More
Bitcoin loan

How to Get a Loan in BTC

Confused about the pros and cons of getting a loan in Bitcoin? Learn the essential facts needed...

Read More
bollinger band

Bollinger Band Breakouts, Squeezes, and Divergences

Bollinger Band breakouts, squeezes, and divergences are powerful volatility-based trade setups. Learn how to navigate this lucrative...

Read More


Getting Started Gold Bars.


Binance CEO CZ Predicts a Crypto Market Bull Run

Binance CEO Changpeng Zhao, also known as CZ believes that a crypto market bull-run is inevitable. He expressed this during a recent interview with CNBC. Presently, cryptocurrency enthusiasts, HODlers and…


Getting Started Gold Bars.


Aaron has spent 10+ years in different start-up, business environments wearing hats in marketing, sales, management and operations.

After doing business development and content marketing for a Silicon Valley IT and Cloud services firm, Aaron realized how technology is transforming everything we do in our personal and professional lives.

This prompted a deeper professional interest in the Bitcoin and Blockchain space which he had been dabbling in since 2014 as a miner and trader.

Aaron now writes about Blockchain Technologies and does content marketing and business development for CoinStructive, a Bitcoin and Blockchain consulting firm.